Information security professionals: Do you know what’s necessary to secure the API portion of your operations—from the applications, developers and end-users to the back-end systems to the APIs? Do you know what APIs you have? Do you know what data is being shared via APIs with your trusted and untrusted customers? Are all APIs created equal? Are they secure?